Data-driven insight into the puzzle-based cybersecurity training

Puzzle-based training is a common type of hands-on activity accompanying formal and informal cybersecurity education, much like programming or other IT skills. However, there is a lack of tools to help the educators with the post-training data analysis. Through a visualization design study, we designed the Training Analysis Tool that supports learning analysis of a single hands-on session. It allows an in-depth trainee comparison and enables the identification of flaws in puzzle assignments. We also performed a qualitative evaluation with cybersecurity experts and students. The participants apprised the positive influence of the tool on their workflows. Our insights and recommendations could aid the design of future tools supporting educators, even beyond cyber security.

READ FULL TEXT

page 5

page 8

page 10

research
07/20/2019

Learning Vis Tools: Teaching Data Visualization Tutorials

Teaching and advocating data visualization are among the most important ...
research
12/09/2020

TaskTracker-tool: a Toolkit for Tracking of Code Snapshots and Activity Data During Solution of Programming Tasks

The process of writing code and use of features in an integrated develop...
research
03/06/2021

ChartStory: Automated Partitioning, Layout, and Captioning of Charts into Comic-Style Narratives

Visual data storytelling is gaining importance as a means of presenting ...
research
07/29/2020

Simulator as a Tool for the Future Maritime Education and Research: A Discussion

A few studies in the maritime domain utilize co-design in ship design wo...
research
01/05/2021

Cybersecurity Knowledge and Skills Taught in Capture the Flag Challenges

Capture the Flag challenges are a popular form of cybersecurity educatio...
research
07/02/2019

GTIRB: Intermediate Representation for Binaries

GTIRB is an intermediate representation for binary analysis and transfor...
research
08/14/2023

Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners

Offensive security-tests are a common way to pro-actively discover poten...

Please sign up or login with your details

Forgot password? Click here to reset